We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

quant-ph

References & Citations

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Quantum Physics

Title: Finite-key security analysis for quantum key distribution with leaky sources

Abstract: Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. This assumption is, however, very hard to meet in practice, and thus the security of current QKD implementations is not guaranteed. Here, we fill this gap by providing a finite-key security analysis for QKD which is valid against arbitrary information leakage from the state preparation process of the legitimate users. For this, we extend the techniques introduced in (New J. Phys. 18, 065008, (2016)) to the finite-key regime, and we evaluate the security of a leaky decoy-state BB84 protocol with biased basis choice, which is one of the most implemented QKD schemes today. Our simulation results demonstrate the practicability of QKD over long distances and within a reasonable time frame given that the legitimate users' devices are sufficiently isolated.
Comments: 21 pages, 5 figures
Subjects: Quantum Physics (quant-ph)
Journal reference: New J. Phys. 20 083027 2018
DOI: 10.1088/1367-2630/aad839
Cite as: arXiv:1803.09508 [quant-ph]
  (or arXiv:1803.09508v1 [quant-ph] for this version)

Submission history

From: Weilong Wang [view email]
[v1] Mon, 26 Mar 2018 11:15:55 GMT (1112kb,D)

Link back to: arXiv, form interface, contact.